Sandmark--A Tool for Software Protection Research
暂无分享,去创建一个
[1] Anas N. Al-Rabadi,et al. A comparison of modified reconstructability analysis and Ashenhurst‐Curtis decomposition of Boolean functions , 2004 .
[2] Maurice H. Halstead,et al. Elements of software science (Operating and programming systems series) , 1977 .
[3] Maurice H. Halstead,et al. Elements of software science , 1977 .
[4] Sallie M. Henry,et al. Software Structure Metrics Based on Information Flow , 1981, IEEE Transactions on Software Engineering.
[5] Warren A. Harrison,et al. A complexity measure based on nesting level , 1981, SIGP.
[6] Taghi M. Khoshgoftaar,et al. Measurement of data structure complexity , 1993, J. Syst. Softw..
[7] Chris F. Kemerer,et al. A Metrics Suite for Object Oriented Design , 2015, IEEE Trans. Software Eng..
[8] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[9] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[10] Gang Qu,et al. Analysis of watermarking techniques for graph coloring problem , 1998, 1998 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (IEEE Cat. No.98CB36287).
[11] Christian S. Collberg,et al. Breaking abstractions and unstructuring data structures , 1998, Proceedings of the 1998 International Conference on Computer Languages (Cat. No.98CB36225).
[12] Christian S. Collberg,et al. Software watermarking: models and dynamic embeddings , 1999, POPL '99.
[13] Miodrag Potkonjak,et al. Hiding Signatures in Graph Coloring Solutions , 1999, Information Hiding.
[14] Jean-Jacques Quisquater,et al. Robust Object Watermarking: Application to Code , 1999, Information Hiding.
[15] Ramarathnam Venkatesan,et al. A Graph Theoretic Approach to Software Watermarking , 2001, Information Hiding.
[16] Mikhail J. Atallah,et al. Protecting Software Code by Guards , 2001, Digital Rights Management Workshop.
[17] Robert E. Tarjan,et al. Dynamic Self-Checking Techniques for Improved Tamper Resistance , 2001, Digital Rights Management Workshop.
[18] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[19] Christian S. Collberg,et al. Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks , 2003, ICISC.